Results for integrated security

Industry Trends

Executive Insights: Surviving Your Digital Transformation

Digital Transformation Without an Equivalent Security Transformation is Leaving Organizations More Vulnerable 2018 is lining up to be the year of Digital Transformation. Just about every organization looking to remain viable in the growing digital marketplace has some sort of digital transformation in progress or one in the planning stages for this year. These projects range from implementing basic applications to better interact with online consumers, to converging OT and IT networks, or even pushing their entire infrastructure to the cloud.

By John MaddisonFebruary 19, 2018

Business and Technology | Industry Trends

Executive Insights: Winning the Digital Transformation Cyberwar

The vast majority of cybercrime we deal with is opportunistic and automated. It is the domain of criminals trolling for the unaware and vulnerable. They target unpatched systems and vulnerable applications, exploit gullible end users, break through inadequate security systems, and infect people wandering around the web in places they probably shouldn’t go.

By Jonathan Nguyen-DuyFebruary 15, 2018

Industry Trends

Going “Open” with the Fortinet Fabric-Ready Partner Program

Good companies evolve; great companies push the market to evolve. Fortinet has collaborated with a cadre of best-in-class technology alliance partners to produce the industry’s first truly open security framework. The Fortinet Security Fabric is the culmination of technological and partnership initiatives to provide the market with a holistic security strategy designed to solve real-world problems. Today’s announcement expands Fortinet’s robust ecosystem of technology alliances by expanding the functionality of the Fortinet Security...

By Neil PrasadSeptember 26, 2016

Threat Research

On Tests, Firewalls and Modern Threat Mitigation

It’s a fact: Today’s threats have made the threats of yesterday a vision in the rear-view mirror, along with the security counterparts developed to tackle them. It’s also quite known that the legacy firewall is easily circumvented by modern threats. For example, botnets frequently communicate over common ports like HTTP to do their dirty work – sending stolen information and receiving tasks to carry out. Thus, one could deduce that TCP port 80 is a security threat and, on the strongest countermeasure, should be blocked. However, in today's...

By Derek MankyApril 12, 2011